(ISC)²® Celebrates National Cyber Security Awareness Month with Series of Security Awareness Tips to Educate the General Public
Atlanta, Ga. (PRWEB) October 01, 2014 -- (ISC)²® (“ISC-squared”), the largest not-for-profit membership body of certified information and software security professionals with over 100,000 members worldwide, today announced its plans to provide one set of security awareness tips each week throughout the month of October in support of the 11th annual National Cyber Security Awareness Month (NCSAM).
As a Champion of NCSAM, (ISC)2 will release a series of security awareness tips to include: tips for conference attendees; Safe and Secure Online® tips for parents, teachers, and seniors; tips for home owners; tips for CEOs; and tips for more secure software.
The first set of tips, authored by members of the (ISC)2 information security team, include advice for conference attendees:
Mobile Connections
• When not in use, disable your device’s wireless, Bluetooth, and NFC communication capabilities. This includes all of you mobile devices to include tablets, phones, and laptops.
• Prior to leaving for a conference, remove any common “known” networks from your mobile devices. Hackers will attempt to use common saved network names attempt to get your phone to connect to their rogue access point (e.g., Starbucks, Linksys, Netgear, etc.).
• Try to avoid connecting to “public” Wifi hotspots. There are no guarantees as to the security of the hotspots. Many of these hotspots could be hosted for the sole purpose of capturing data. Furthermore, if you are connecting to a wireless hotspot that doesn’t provide encryption, make sure not to log in to any online accounts because everything you do online could be visible to other people. If you must connect to a public Wifi hotspot, use a VPN and secure Web browser.
Device Security
• Remember to require a pin/passcode to access your mobile devices. You may want to consider reducing the amount of time before your device automatically locks.
• As always, remember to avoid storing sensitive/confidential data on your laptop/mobile device unless you absolutely need it during your trip.
• Please make sure to use your own phone charger when connecting to mobile device charge stations. Attaching your mobile device to an unknown USB cord could give unauthorized access to the data on your device.
• Keep your laptop/phone/tablet with you. If you need to leave them in the hotel room, use the safe in the hotel to store the device(s).
Physical Security
• Avoid the public kiosk computers. If you have to use them, make sure that you are not using them to access anything sensitive/confidential (including your personal accounts like Facebook, Twitter, etc.).
• When working at a booth or check-in desk during events, make sure to always keep a close eye on hardcopy materials (attendee lists with personal information) and devices (laptops, phones). If you have to leave the booth/table, make sure someone is in charge of watching the materials. If no one is available to watch the items, take them with you.
• Be wary of free vendor “giveaways.” While the t-shirt is probably safe, you need to be especially careful with giveaways such as free USB storage devices, as they could potentially carry malware.
• Lastly, if your device is lost or stolen, contact your IT administrator immediately so he/she can take the proper steps to clear the data from the device.
“As the leading professional body for the information security industry, we are proud to support the goals of National Cyber Security Awareness Month again this year,” said W. Hord Tipton, CISSP, executive director, (ISC)2. “Today’s security threats are difficult enough for professionals to keep up with, let alone the average end-user. (ISC)2 is dedicated to inspiring a safe and secure cyber world, and we hope that these security awareness tips will help to better educate the general public.”
# # #
About (ISC)²Ò
Formed in 1989 and celebrating its 25th anniversary, (ISC)² is the largest not-for-profit membership body of certified information and software security professionals worldwide, with over 100,000 members in more than 160 countries. Globally recognized as the Gold Standard, (ISC)² issues the Certified Information Systems Security Professional (CISSPÒ) and related concentrations, as well as the Certified Secure Software Lifecycle Professional (CSSLPÒ), the Certified Cyber Forensics Professional (CCFPSM), Certified Authorization Professional (CAPÒ), HealthCare Information Security and Privacy Practitioner (HCISPPSM), and Systems Security Certified Practitioner (SSCPÒ) credentials to qualifying candidates. (ISC)²’s certifications are among the first information technology credentials to meet the stringent requirements of ISO/IEC Standard 17024, a global benchmark for assessing and certifying personnel. (ISC)² also offers education programs and services based on its CBK®, a compendium of information and software security topics. More information is available at http://www.isc2.org.
# # #
© 2014, (ISC)² Inc., (ISC)², CISSP, ISSAP, ISSMP, ISSEP, CSSLP, CAP, SSCP and CBK are registered marks, and CCFP and HCISPP are service marks, of (ISC)2, Inc.
Michelle Schafer, Merritt Group, +1 (703) 390-1525, [email protected]
Share this article